Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encrypted network traffic identification method based on deep neural network

A deep neural network and network traffic technology, applied in the field of network service security and traffic identification, deep learning, can solve the problems of poor stability, low recognition accuracy and accuracy rate, high misjudgment and missed judgment rate, and achieve good accuracy rate, Low false positive rate and false positive rate to ensure high efficiency

Active Publication Date: 2019-09-17
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF9 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to propose a method for identifying encrypted network traffic based on a deep neural network in view of the technical defects of low recognition accuracy and accuracy, high misjudgment and missed judgment rates, and poor stability in existing encrypted network traffic classification and identification.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted network traffic identification method based on deep neural network
  • Encrypted network traffic identification method based on deep neural network
  • Encrypted network traffic identification method based on deep neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] This embodiment is a complete process based on steps 1 to 5 of the present invention, in which aragon, bancor, canwork, chainy, cryptopepes, eth_town, etheremon, idex, joyso, cryptokitties, lordless, makerdao, matchpool, ono, originprotocol has a total of fifteen Dapps as data sources, covering various fields of games, social networking, and finance in the blockchain platform. The data collection process specifically corresponds to steps 1 and 4 in the content of the invention, and then these collected offline data packets are input into the network training and online recognition.

[0069] When the method for identifying encrypted network traffic based on a deep neural network is specifically implemented, it includes two parts: an offline training phase and an online identification phase;

[0070] Among them, in the offline training phase, corresponding to step 3 in the content of the invention, the system collects the traffic transmitted by 15 Dapps using the encrypti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encrypted network traffic identification method based on a deep neural network, and belongs to the technical field of deep learning, network service security and traffic identification. The encrypted network traffic identification method based on the deep neural network comprises the steps of 1, obtaining an offline data set based on capture, deployment and extraction operations, and generating a training set and a test set; 2, building a deep neural network model; 3, performing data reading, model training and parameter optimization: inputting the offline data set into a deep neural network model for training and iteration until the accuracy reaches the standard, and then stopping training; 4, establishing and deploying an online network flow capture platform, and capturing an online data set; and 5, performing online network flow identification to obtain an identification result. According to the method, high-dimensional features of the flow data can be better extracted; compared with an existing deep neural network, the method has the advantages of better multi-classification recognition accuracy, lower false positive rate and lower false alarm rate, and ensures the high efficiency of encrypted data flow on-line recognition.

Description

technical field [0001] The invention relates to a method for identifying encrypted network traffic based on a deep neural network, which aims at identifying encrypted network traffic types, and belongs to the technical fields of deep learning, network service security, and traffic identification. Background technique [0002] Traffic is an important carrier of various types of information in network transmission. In order to protect user privacy, existing networks mostly use the SSL / TLS encryption protocol to encrypt network traffic. Through the analysis and identification of encrypted network traffic, it can provide technical support for the traffic audit work of network service providers, so that they can better formulate routing strategies, improve the data distribution efficiency of key transmission nodes, provide a theoretical basis, and further improve the user experience of network users. experience. In practical application of this method, it should be arranged in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N3/04G06N3/08
CPCH04L63/1408G06N3/084G06N3/045
Inventor 沈蒙谭曰文张晋鹏祝烈煌陈偲祺
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products